You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@apr.apache.org by co...@apache.org on 2023/01/23 18:20:04 UTC

svn commit: r1906955 - /apr/site/trunk/tools/release.sh

Author: covener
Date: Mon Jan 23 18:20:04 2023
New Revision: 1906955

URL: http://svn.apache.org/viewvc?rev=1906955&view=rev
Log:
copy paste

Modified:
    apr/site/trunk/tools/release.sh

Modified: apr/site/trunk/tools/release.sh
URL: http://svn.apache.org/viewvc/apr/site/trunk/tools/release.sh?rev=1906955&r1=1906954&r2=1906955&view=diff
==============================================================================
--- apr/site/trunk/tools/release.sh (original)
+++ apr/site/trunk/tools/release.sh Mon Jan 23 18:20:04 2023
@@ -42,7 +42,7 @@
 #         # Process the CVEs that have been part of the release:
 #      6. set CVEs to READY on the cveprocess site
 #         - Fill in a 'reference' tag 'vendor-advisory' with the URL to your public post about
-#           this issue.  A link to https://httpd.apache.org/security/vulnerabilities_24.html is sufficient.
+#           this issue.  A link to CHANGES doc updated above is sufficient.
 #         - Use the 'OSS/ASF Emails' tab for the emails you should send to oss-security
 #           and to Apache lists.
 #         - ASF Security will be notified and will submit to the CVE